Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-40012
HistoryAug 09, 2023 - 3:33 p.m.

CVE-2023-40012 uthenticode EKU validation bypass

2023-08-0915:33:54
CWE-325
CWE-347
GitHub_M
www.cve.org
uthenticode
cross-platform library
authenticode
digital signatures
certificate profile
x.509
eku validation
pe file
code signatures
ssl certificate
vulnerability
cve-2023-40012

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

21.9%

uthenticode is a small cross-platform library for partially verifying Authenticode digital signatures. Versions of uthenticode prior to the 2.x series did not check Extended Key Usages in certificates, in violation of the Authenticode X.509 certificate profile. As a result, a malicious user could produce a “signed” PE file that uthenticode would verify and consider valid using an X.509 certificate that isn’t entitled to produce code signatures (e.g., a SSL certificate). By design, uthenticode does not perform full-chain validation. However, the absence of EKU validation was an unintended oversight. The 2.0.0 release series includes EKU checks. There are no workarounds to this vulnerability.

CNA Affected

[
  {
    "vendor": "trailofbits",
    "product": "uthenticode",
    "versions": [
      {
        "version": "< 2.0.0",
        "status": "affected"
      }
    ]
  }
]

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

21.9%

Related for CVELIST:CVE-2023-40012